Timestamps in key distribution protocols

  • Authors:
  • Dorothy E. Denning;Giovanni Maria Sacco

  • Affiliations:
  • Purdue Univ., West Lafayette, IN;Purdue Univ., West Lafayette, IN

  • Venue:
  • Communications of the ACM
  • Year:
  • 1981

Quantified Score

Hi-index 48.23

Visualization

Abstract

The distribution of keys in a computer network using single key or public key encryption is discussed. We consider the possibility that communication keys may be compromised, and show that key distribution protocols with timestamps prevent replays of compromised keys. The timestamps have the additional benefit of replacing a two-step handshake.